SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
TO
         BY Y
               00 CH
       K AR          TO
  BO EBR £3 AR
      O U
      F E      M 00
  TH V
28 A 28T £1
             H
     S BY E
            V
     O SA
       K

                                            SMi Presents their 6th annual
  B O




                    CYBER SECURITY FOR
                     THE MILITARY AND
                     DEFENCE SECTOR
                     19 - 20 JUNE 2013 | COPTHORNE TARA HOTEL | LONDON, UK



                                                      CONFIRMED CHAIRMAN:
        WHY SHOULD YOU ATTEND
        • LEARN- about emerging                              Mr Geoff Harris, Management Council, Information
          threats, current initiatives and                   Security Systems Associations UK
          the recent technical
          developments in network,                    SPEAKER PANEL INCLUDES
          firewall, and database
          security                                          Commander Wolfgang Roehrig, Project Officer Cyber Defence,
                                                            European Defence Agency
        • ASSESS- the experiences of
          current military operators and                    Dr Jamie Shea, Deputy Assistant Secretary General, Emerging
          share ideas with civilian                         Security Challenges Division, NATO
          industrial peers                                  Mr Ulrich Poeschl, Chief Security Architect, Infosec Planning &
        • ANALYSE- the latest cyber                         Implementation Authority, Austrian MoD
          defence solutions, training                       Mr John Ross, Strategic Analyst, Canadian Department of
          and network threats                               National Defence
        • ENGAGE- with international                        Ms Heli Tiirma Klaar, Cyber Security Policy Advisor, Conflict
          military and inductrial                           Prevention and Security Policy Directorate, European External
          representatives in dedicated                      Action Service
          question & answer sessions.                       Hasan Yasar, Technical Manager, CERT, Digital Intelligence and
          Communicate directly with                         Investigations, Software Engineering Institute
          military operators, defence                       Mr Akira Yamada, Senior Security Analyst, Cyber Defence
          contractors tasked with                           Institute Japan
          supplying secure equipment,
                                                            Special Agent representative, FBI Cyber ALAT, Cyber Division,
          as well as experts at the
                                                            Federal Bureau of Investigation
          forefront of producing cyber
          security solutions.                               Mr Patrick Curry OBE, Director, British Business Federation
                                                            Authority



                          PLUS TWO INTERACTIVE HALF-DAY PRE-CONFERENCE WORKSHOPS
                                     18 JUNE 2013 | COPTHORNE TARA HOTEL | LONDON, UK


  A: Threat Intelligence, Threat Horizons                         B: Process Modelling for Information Security
       WORKSHOP LEADER: Mr Cristiano Lincoln Mattos, SEO,              Engineering (PROMISE) in the UKCNI
                Tempest Security Intelligence
                        09.00-12.30                                    WORKSHOP LEADER: Dr Howard Thompson, Managing Director,
                                                                                            NAS Defence
                                                                                             13.00-17.00



                             www.cyberdefenceevent.com
 Register online or fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711
DAY ONE I 19 JUNE 2013                                                                   www.cyberdefenceevent.com


 08.30   REGISTRATION & COFFEE                                       13.40
                                                                     Risks of Social Media to Organizations and Personnel
 09.00                                                               • Insight into potentially disruptive effect of social media on
 Chairman's Opening Remarks
                                                                       defence and security
        Mr Geoff Harris, Management Council, Information
                                                                     • Insight into personnel implications from work-related to
        Security Systems Associations UK
                                                                       personal issues
 OPENING ADDRESS                                                     • Insight into organizational implications including cyber-vetting,
 09.10                                                                 trust and potential effects on organizational management
 NATO’s policy on cyber defence and the evolution of the cyber       • Using example from real-world and potential scenarios
 challenge                                                                   John Ross, Strategic Analyst, Canadian Department of
 • How cyber is changing the nature of conflict and crisis
                                                                             National Defence
   management
 • NATO's perception of the cyber threat
 • How NATO is constructing its cyber defence organization           14.20
 • Future tasks and challenges                                       Sharing sensitive information securely- times are changing
         Dr Shea, Deputy Assistant Secretary General, Emerging       • What business and cyber information is being shared securely
         Security Challenges Division, NATO                            and the strategic drivers for it?
                                                                     • What are the collaborative mechanisms, technologies and
 09.50
                                                                       standards enabling such sharing, and the threats to success?
 Technical aspects of cyber security as seen by the Austrian
 military and the local milCERT                                      • Where is such information sharing happening in UK and
 • What is as an "advanced threat"?                                    internationally?
 • (Scary) ways around conventional defence mechanisms               • What's likely to happen in the next 3 years and what should
 • Live-Demo of a target-system infection with conventional            my organisation be doing?
   defence
                                                                             Mr Patrick Curry OBE, Director, British Business Federation
 • Emerging cyber threats - strategies to cope with them
 • Optional: Further live-demos (Fighting back the malware from              Authority
   1st demo, create custom anti-virus signatures)
          Mr Ulrich Poeschl, Chief Security Architect, Infosec       15.00   AFTERNOON TEA
          Planning & Implementation Authority, Austrian MoD
                                                                     15.30
 10.30   MORNING COFFEE
                                                                     Cyber Security and the UK's Critical National Infrastructure
 11.00                                                               • Identifying what elements are ‘critical’
 Adversity, risk and trustworthiness                                 • Benefits and risks of international commercial cooperation
 • Why there is a need for a consensus on adversity, risk and        • Creating and maintaining a stable cyber policy for protecting
   trustworthiness                                                     CNI
 • The role of Standards Development Organisations (SDO) in                  Mr Dave Clemente, Research Associate, International
   achieving such a consensus
                                                                             Security, Royal Institute of International Affairs
 • Achieving the desired outcome with the Trustworthy Software
   Framework (TSF)
         Mr Ian Bryant, Technical Director, Trustworthy Software     16.10
         Initiative                                                  Defending the UK defence industry against cyber attack
                                                                     • The changing landscape of the cyber threat to the UK
 11.40                                                                 Defence Industry
 Speed up the velocity of investigation with behaviour analysis of
                                                                     • Understanding your cyber resilience maturity in the face of the
 malware
                                                                       cyber threat?
 • Identify and capture the signature of suspicious files,
 • Behavioural Analysis with correlation of other artefact,          • How the UK Defence industry is working together to detect,
 • Importance of Multiple Analysis Platform,                           analyse and respond to threats
 • How to correlate multiple malware and find the similar ones?      • What does the cyber future bring for the UK Defence Industry?
 • Result: Malware activity graphs.                                          Mr Vincent Blake, Head of Cyber Security,
         Hasan Yasar, Technical Manager, CERT, Digital
                                                                             Raytheon UK
         Intelligence and Investigations, Software Engineering
         Institute
                                                                     16.50
 12.20   NETWORKING LUNCH                                            Chairman's Closing Remarks and Close of Day One




            Register online at www.cyberdefenceevent.com • Fax: +44 (0) 870 90
                                                             Supported by
DAY TWO I 20 JUNE 2013                                                                  www.cyberdefenceevent.com


    08.30     REGISTRATION & COFFEE                                       13.40
                                                                          Achieving global cyber security through cooperation
    09.00                                                                 • About ENISA
                                                                          • Protecting Critical Information Infrastructure
    Chairman's Opening Remarks
                                                                          • Input to EU & MS Cyber Security Strategies
              Mr Geoff Harris, Management Council, Information            • Assisting Operational Communities
              Security Systems Associations UK                            • Security & Data Breach Notification
                                                                          • Data Protection
    OPENING ADDRESS                                                       • Future Direction
    09.10                                                                          Dr Steven Purser, Head of Core Operations Department,
                                                                                   European Network and Information Security Agency
    The FBI's role in the advancement of cyber security
                                                                                   (ENISA)
              Special Agent representative, FBI Cyber ALAT, Cyber
              Division, Federal Bureau of Investigation                   14.20
                                                                          Voluntary participation in national cyber defence: The example
    09.50                                                                 of the Estonian cyber defence unit
    Strategies for cyber security and defence: Organisational             • Legal and policy framework for using volunteers in national
                                                                            cyber defence
    perspective
                                                                          • Functioning and roles of the CDU: Estonian case study
    • Presentation will offer a blueprint what constitutes a successful
                                                                          • Legal implications arising from using volunteers in national
      cyber strategy                                                        cyber defence
    • Comparison of national cyber strategies                                      Senior Scientist, Legal & Policy Branch,
    • Basic elements of a cyber defence policy of a multinational                  NATO CCD COE
      organisation
    • Major elements for a successful national cyber security and
      defence strategy                                                    15.00   AFTERNOON TEA
              Ms Heli Tiirma Klaar, Cyber Security Policy Advisor,
                                                                          15.30
              Conflict Prevention and Security Policy Directorate,
                                                                          Cyber security incident response
              European External Action Service                            • The security services industry’s response to cyber security
                                                                            threats; how do you prepare for an incident and what are the
    10.30   MORNING COFFEE                                                  immediate steps and decision making process that you will
                                                                            have to go through following an incident
                                                                          • Government and private sector initiatives for validating third
    11.00
                                                                            party security services providers
    Cyber Defence Capability Building in EU
                                                                          • How to identifying suitable cyber security incident response
    • Military aspects of the cyber security strategy for the European      service suppliers and what should be considered in contracts
      Union                                                                 for their services
    • Military capability development in EU cyber defence                         Mr Ian Glover, President,
    • Pooling & Sharing in Cyber Defence                                          CREST
    • A stock-take of EU cyber defence capability
              Commander Wolfgang Roehrig, Project Officer Cyber           16.10
                                                                          Building and managing a comprehensive computer Incident
              Defence, European Defence Agency
                                                                          response capability
                                                                          • Don't start when the horse has bolted; Starting with protection
    11.40                                                                   and defence
    Japanese cyber security update                                        • Scope and ambition
    • Cyber threats/attacks in Japan                                      • Appetite for Interoperability
    • Response activities                                                   - Are you prepared to share with other nations?
    • Findings from massive cyber attacks                                 • What tools are out there?
                                                                          • The need for integration and cooperation
    • Activities on digital Forensics
                                                                                  Mr Jeremy O’Connor, Security & Smart Solutions,
              Mr Akira Yamada, Senior Security Analyst,
                                                                                  Selex ES
              Cyber Defence Institute Japan
                                                                          16.50
    12.20   NETWORKING LUNCH                                              Chairman's Closing Remarks and Close of Day Two




090 712 • Call: +44 (0) 870 9090 711 • GROUP DISCOUNTS AVAILABLE

    SPONSORSHIP AND EXHIBITION OPPORTUNITIES                                        Are you interested in promoting your defence services to a
    SMi offer sponsorship, exhibition, advertising and branding packages,              targeted industry sector? SMi offer tailored marketing
    uniquely tailored to complement your company's marketing strategy. Prime         packages so that your association / publication can gain
    networking opportunities exist to entertain, enhance and expand your client
                                                                                    access to a global market and key decision makers in the
    base within the context of an independent discussion specific to your
                                                                                                          defence market.
    industry. Should you wish to join the increasing number of companies
    benefiting from sponsoring our conferences please call: Simon Wright, SMi       Contact Sonal Patel, SMi Marketing on +44 (0) 20 7827 6106
    Sponsorship +44 (0) 20 7827 6732 or email: swright@smi-online.co.uk                          or email: spatel@smi-online.co.uk
HALF-DAY PRE-CONFERENCE WORKSHOP A
         9.00 – 12.30 I 18 JUNE 2013
 COPTHORNE TARA HOTEL I LONDON, UK

          Threat Intelligence,
            Threat Horizons


In association with



Overview
This workshop will give delegates a valuable
insight in to the actions and motivations of
potential attackers and understand the number,
diversity and speed of actual attacks on their
systems and the motivation, techniques, strategies
and operations of the attackers as well as the
implications of changing IT trends such as BYOD,
cloud computing and mobile technology. For too
long we have been playing ‘catch up’ with the
cyber criminals – it’s time to get ahead of the
game and give ourselves an intelligent
advantage.

Agenda
08.30 Registration & Coffee

09.00 Global cyber threat outlook (recent
      discoveries/attacks and operations with
      their likely background and
      impact/international implications)

09.45 Morning Coffee

10.30 Sector specific cyber threat outlook
      (financial sector/CNI/aviation/pharma etc)

11.15 Collateral damage from malware used on
      an international base
      (examples for Flame, Duqu, Stuxnet and
      how they are being exploited by cyber
      criminals)

12.00 End of Workshop


About the Workshop Leader
Mr Cristiano Lincoln Mattos, SEO, Tempest
Security Intelligence
CEO Cristiano Lincoln Mattos has been active in
Information Security since being introduced to the
internet in 1993, and has accumulated significant
experience in both engineering and testing
security defences. As one of Tempest’s founders,
Lincoln has fulfilled a critical role in creating and
developing the company’s expertise, products
and strategy over the past 12 years.               An
experienced consultant, he has assumed a
variety of roles within Tempest, including
penetration testing and vulnerability research
projects, developing software tools, and building
and leading top-notch teams through complex
technical projects.

About Tempest Security Intelligence
Tempest Security Intelligence has been delivering
exceptional service quality to Clients in Brazil and
Europe for the past 12 years. Tempest delivers
highly specialised information security consulting
services to large and medium-sized organisations
in the private and public sectors, and is relied on
to protect some of the largest global financial
institutions. Our focus on information security
management allows us to build long-term,
strategic relationships with our clients that result in
stable and continuous service. Our in-depth
knowledge, expertise and extensive R&D efforts,
have given Tempest an authoritative position in
the cyber security market.
HALF-DAY PRE-CONFERENCE WORKSHOP B
         13.30-17.00 I 18 JUNE 2013
 COPTHORNE TARA HOTEL I LONDON, UK

      Process Modelling for
Information Security Engineering
     (PROMISE) in the UKCNI


  In association with



Overview
The UK Critical National Infrastructure (UKCNI) is
crucial to the safetl and defence of the UK,
however, they are not always Government
owned, are often in the hands of foreign owners
and are not subject to a consistent or supervised
level of information security. This workshop will
address this issue by presenting a model for the
design of a socio-technical information security
engineering management design methodology
for the purpose of reconciling technical
requirements with human and social factors
inherent in any management system. The method,
called PROMISE (Process Modelling for Information
Systems Engineering), is intended to provide a
model for a researched platform of ideas,
expressed as processes, in order to better inform
information security decisions with the aim of
making those decisions better suited to the needs
of the information security manager operating in
a UKCNI organisation.

Agenda
13.30 Registration & Coffee

14.00 Security management in the UKCNI- It’s not
      just technology

15.00 Afternoon Tea

15.30 How can Information security management
      processes in the UKCNI be better designed,
      developed and implemented?

16.30 Question & Answer Discussion

17.00 End of Workshop


About the Workshop Leader
             Dr Howard Thompson, Managing
             Director, NAS Defence
             After a career in policing, security and
             counter-intelligence work in government
             service, a number of years of which
             were spent in IT and Communications
Security, Dr Howard Thompson moved into the
private sector where he built on his technical
expertise by gaining commercial and industrial
sector skills and knowledge. Since then, he has
undertaken a number of IT security consultancy and
management roles in various international industries
including aerospace, defence and systems, and
now practices as an IT Security Consultant,
providing services to many companies and
organisations that now comprise the UKCNI.

About NAS CyberDefence
NAS CyberDefence consultancy services are
designed to help organizations to realize the secure
and safe management of corporate governance,
manage operational risk, maintain legal, regulatory
and standards compliance, protect intellectual
property and secure business communications.
ONLINE at www.cyberdefenceevent.com
                             CYBER SECURITY FOR THE MILITARY AND DEFENCE SECTOR
                       CONFERENCE: 19 - 20 JUNE 2013 COPTHORNE TARA HOTEL, LONDON, UK | WORKSHOPS: 18 JUNE 2013

                                                                                        4 WAYS TO REGISTER

FAX your booking form to +44 (0) 870 9090 712                                                           POST your booking form to: Events Team, SMi Group Ltd, 2nd Floor South,
PHONE on +44 (0) 870 9090 711                                                                           Harling House, 47-51 Great Suffolk Street, London, SE1 0BS


                                                                                                          EARLY BIRD □                     Book by 28 February and receive a £300 discount
                                                                                                          DISCOUNT □                       Book by 28 March and receive a £100 discount


                                                                                                           CONFERENCE PRICES                                              GROUP DISCOUNTS AVALABLE
                                                                                                          I would like to attend: (Please tick as appropriate) Fee                                 Total
                                                                                                          MILITARY, GOVERNMENT & PUBLIC SECTOR RATE
                                                                                                          □ Conference and both Workshops                      £2097.00                    + VAT   £2516.40
                                                                                                          □ Conference & Interactive Workshop                  £1498.00                    + VAT   £1797.60
Unique Reference Number                                                                                   □ Conference only                                    £899.00                     +VAT    £1078.80
Our Reference                                  LV D-031                                                   □ Interactive Workshop only                          £599.00                     +VAT    £718.80
                                                                                                          COMMERCIAL ORGANISATIONS
DELEGATE DETAILS                                                                                          □ Conference and both Workshops                                     £2697.00     + VAT   £3236.40
Please complete fully and clearly in capital letters. Please photocopy for additional delegates.
                                                                                                          □ Conference & Interactive Workshop                                 £2098.00     +VAT    £2517.60
Title:                   Forename:                                                                        □ Conference only                                                   £1499.00     +VAT    £1798.80
Surname:                                                                                                  □ Interactive Workshop only                                         £599.00      +VAT    £718.80
Job Title:                                                                                                PROMOTIONAL LITERATURE DISTRIBUTION
Department/Division:                                                                                      □ Distribution of your company’s promotional
                                                                                                               literature to all conference attendees                         £999.00      + VAT £1198.80
Company/Organisation:
                                                                                                          The Conference fee includes refreshments, lunch, conference papers and
Company VAT Number:                                                                                       CD ROM containing all of the presentations.
Email:
Address:                                                                                                   VENUE             Copthorne Tara Hotel, Scarsdale Place, Kensington, London, W8 5SR.

                                                                                                           □ Please contact me to book my hotel
Town/City:
                                                                                                           Alternatively call us on +44 (0) 870 9090 711,
Post/Zip Code:                                Country:                                                     email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712
Direct Tel:                                       Direct Fax:
Mobile:                                                                                                    DOCUMENTATION                                             (Shipped 10-14 days after the event)
Switchboard:                                                                                               I cannot attend but would like to purchase access to               the following Document
                                                                                                           Portal/paper copy documentation:                                    Price              Total
Signature:                                                                   Date:                         □ Access to the conference documentation
I agree to be bound by SMi's Terms and Conditions of Booking.                                                  on the Document Portal                                         £499.00      + VAT   £598.80
ACCOUNTS DEPT                                                                                              □ The Conference Presentations - paper copy                        £499.00      -       £499.00
                                                                                                               (or only £300 if ordered with the Document Portal)
Title:                   Forename:
Surname:                                                                                                   PAYMENT
Email:
                                                                                                          Payment must be made to SMi Group Ltd, and received before the event, by one of
Address (if different from above):                                                                        the following methods quoting reference D-031 and the delegate’s name. Bookings
                                                                                                          made within 7 days of the event require payment on booking, methods of payment
                                                                                                          are below. Please indicate method of payment:
Town/City:                                                                                                □ UK BACS                  Sort Code 300009, Account 00936418
Post/Zip Code:                                Country:                                                    □ Wire Transfer            Lloyds TSB Bank Plc, 39 Threadneedle Street, London, EC2R 8AU
                                                                                                                                     Swift (BIC): LOYDGB21013, Account 00936418
Direct Tel:                                       Direct Fax:                                                                        IBAN GB48 LOYD 3000 0900 9364 18
                                                                                                          □ Cheque                   We can only accept Sterling cheques drawn on a UK bank.
Terms and Conditions of Booking                                                                           □ Credit Card              □ Visa □ MasterCard □ American Express
                                                                                                               All credit card payments will be subject to standard credit card charges.
Payment: If payment is not made at the time of booking, then an invoice will be issued and must
be paid immediately and prior to the start of the event. If payment has not been received then            Card No:  □□□□ □□□□ □□□□ □□□□
credit card details will be requested and payment taken before entry to the event. Bookings within

                                                                                                          Valid From □□/□□ Expiry Date □□/□□
7 days of event require payment on booking. Access to the Document Portal will not be given until
payment has been received.

Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, another
delegate to take your place at any time prior to the start of the event. Two or more delegates may        CVV Number □□□□ 3 digit security on reverse of card, 4 digits for AMEX card
not ‘share’ a place at an event. Please make separate bookings for each delegate.

Cancellation: If you wish to cancel your attendance at an event and you are unable to send a              Cardholder’s Name:
substitute, then we will refund/credit 50% of the due fee less a £50 administration charge, providing
that cancellation is made in writing and received at least 28 days prior to the start of the event.
Regretfully cancellation after this time cannot be accepted. We will however provide the                  Signature:                                                         Date:
conferences documentation via the Document Portal to any delegate who has paid but is unable              I agree to be bound by SMi's Terms and Conditions of Booking.
to attend for any reason. Due to the interactive nature of the Briefings we are not normally able to
provide documentation in these circumstances. We cannot accept cancellations of orders                    Card Billing Address (If different from above):
placed for Documentation or the Document Portal as these are reproduced specifically to order.
If we have to cancel the event for any reason, then we will make a full refund immediately, but
disclaim any further liability.

Alterations: It may become necessary for us to make alterations to the content, speakers, timing,



                                                                                                           VAT
venue or date of the event compared to the advertised programme.

Data Protection: The SMi Group gathers personal data in accordance with the UK Data Protection
Act 1998 and we may use this to contact you by telephone, fax, post or email to tell you about
other products and services. Unless you tick here □ we may also share your data with third parties
offering complementary products or services. If you have any queries or want to update any of              VAT at 20% is charged on the attendance fees for all delegates. VAT is also charged on
the data that we hold then please contact our Database Manager databasemanager@smi-
online.co.uk or visit our website www.smi-online.co.uk/updates quoting the URN as detailed above           Document Portal and Literature Distribution for all UK customers and for those EU customers not
your address on the attached letter.                                                                       supplying a registration number for their own country here: _______________________


    If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk

Weitere ähnliche Inhalte

Was ist angesagt?

Building The Framework For A Culture Of Security
Building The Framework For A Culture Of SecurityBuilding The Framework For A Culture Of Security
Building The Framework For A Culture Of Security
mguenther
 
b-confident_smb_sep10_cover_story
b-confident_smb_sep10_cover_storyb-confident_smb_sep10_cover_story
b-confident_smb_sep10_cover_story
Patrick Spencer
 
M2M for Security
M2M for SecurityM2M for Security
M2M for Security
Dale Butler
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your Users
Mike Murray
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
Irsandi Hasan
 
Enhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International CooperationEnhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International Cooperation
Positive Hack Days
 
DLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoDLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés Gallego
Ramsés Gallego
 

Was ist angesagt? (20)

Information Security - The Missing Elements
Information Security - The Missing ElementsInformation Security - The Missing Elements
Information Security - The Missing Elements
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010
 
The Perils that PCI brings to Security
The Perils that PCI brings to SecurityThe Perils that PCI brings to Security
The Perils that PCI brings to Security
 
Building The Framework For A Culture Of Security
Building The Framework For A Culture Of SecurityBuilding The Framework For A Culture Of Security
Building The Framework For A Culture Of Security
 
b-confident_smb_sep10_cover_story
b-confident_smb_sep10_cover_storyb-confident_smb_sep10_cover_story
b-confident_smb_sep10_cover_story
 
Cisco ccna security
Cisco ccna securityCisco ccna security
Cisco ccna security
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
Security, Privacy and the Future Internet
Security, Privacy and the Future InternetSecurity, Privacy and the Future Internet
Security, Privacy and the Future Internet
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
m2m for the Security Industry
m2m for the Security Industrym2m for the Security Industry
m2m for the Security Industry
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Nist leaf pressclub_032911
Nist leaf pressclub_032911Nist leaf pressclub_032911
Nist leaf pressclub_032911
 
7 Things Every Ceo Should Know About Information Security
7 Things Every Ceo Should Know About Information Security7 Things Every Ceo Should Know About Information Security
7 Things Every Ceo Should Know About Information Security
 
M2M for Security
M2M for SecurityM2M for Security
M2M for Security
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your Users
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
Enhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International CooperationEnhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International Cooperation
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
 
DLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoDLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés Gallego
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 

Ähnlich wie Cyber Security for the Military and Defence Sector 2013

E-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_SecurityE-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_Security
Lucy Nicholas
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
Rhys A. Mossom
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber Threats
Dale Butler
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber Threats
PeteAndersen
 

Ähnlich wie Cyber Security for the Military and Defence Sector 2013 (20)

Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012
 
SMi Group's 4th annual Oil & Gas Cyber Security conference
SMi Group's 4th annual Oil & Gas Cyber Security conferenceSMi Group's 4th annual Oil & Gas Cyber Security conference
SMi Group's 4th annual Oil & Gas Cyber Security conference
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015
 
E-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_SecurityE-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_Security
 
SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conference
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
Revolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryRevolution Or Evolution Exec Summary
Revolution Or Evolution Exec Summary
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
aap3 cybersecurity recruitment capabilities
aap3 cybersecurity recruitment capabilitiesaap3 cybersecurity recruitment capabilities
aap3 cybersecurity recruitment capabilities
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber Threats
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber Threats
 

Mehr von Dale Butler

Mehr von Dale Butler (20)

SMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conferenceSMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conference
 
SMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conferenceSMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conference
 
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conferenceSMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
 
SMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conferenceSMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conference
 
SMi Group's Future Soldier Technology USA 2020 conference
SMi Group's  Future Soldier Technology USA 2020 conferenceSMi Group's  Future Soldier Technology USA 2020 conference
SMi Group's Future Soldier Technology USA 2020 conference
 
SMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conferenceSMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conference
 
SMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conferenceSMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conference
 
SMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conferenceSMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conference
 
SMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conferenceSMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conference
 
SMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conferenceSMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conference
 
SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020
 
SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020 SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020
 
SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020
 
SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020 SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020
 
SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020 SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020
 
SMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conferenceSMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conference
 
SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020
 
Space Week 2020
Space Week 2020Space Week 2020
Space Week 2020
 
SMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conferenceSMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conference
 
SMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conferenceSMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conference
 

Cyber Security for the Military and Defence Sector 2013

  • 1. TO BY Y 00 CH K AR TO BO EBR £3 AR O U F E M 00 TH V 28 A 28T £1 H S BY E V O SA K SMi Presents their 6th annual B O CYBER SECURITY FOR THE MILITARY AND DEFENCE SECTOR 19 - 20 JUNE 2013 | COPTHORNE TARA HOTEL | LONDON, UK CONFIRMED CHAIRMAN: WHY SHOULD YOU ATTEND • LEARN- about emerging Mr Geoff Harris, Management Council, Information threats, current initiatives and Security Systems Associations UK the recent technical developments in network, SPEAKER PANEL INCLUDES firewall, and database security Commander Wolfgang Roehrig, Project Officer Cyber Defence, European Defence Agency • ASSESS- the experiences of current military operators and Dr Jamie Shea, Deputy Assistant Secretary General, Emerging share ideas with civilian Security Challenges Division, NATO industrial peers Mr Ulrich Poeschl, Chief Security Architect, Infosec Planning & • ANALYSE- the latest cyber Implementation Authority, Austrian MoD defence solutions, training Mr John Ross, Strategic Analyst, Canadian Department of and network threats National Defence • ENGAGE- with international Ms Heli Tiirma Klaar, Cyber Security Policy Advisor, Conflict military and inductrial Prevention and Security Policy Directorate, European External representatives in dedicated Action Service question & answer sessions. Hasan Yasar, Technical Manager, CERT, Digital Intelligence and Communicate directly with Investigations, Software Engineering Institute military operators, defence Mr Akira Yamada, Senior Security Analyst, Cyber Defence contractors tasked with Institute Japan supplying secure equipment, Special Agent representative, FBI Cyber ALAT, Cyber Division, as well as experts at the Federal Bureau of Investigation forefront of producing cyber security solutions. Mr Patrick Curry OBE, Director, British Business Federation Authority PLUS TWO INTERACTIVE HALF-DAY PRE-CONFERENCE WORKSHOPS 18 JUNE 2013 | COPTHORNE TARA HOTEL | LONDON, UK A: Threat Intelligence, Threat Horizons B: Process Modelling for Information Security WORKSHOP LEADER: Mr Cristiano Lincoln Mattos, SEO, Engineering (PROMISE) in the UKCNI Tempest Security Intelligence 09.00-12.30 WORKSHOP LEADER: Dr Howard Thompson, Managing Director, NAS Defence 13.00-17.00 www.cyberdefenceevent.com Register online or fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711
  • 2. DAY ONE I 19 JUNE 2013 www.cyberdefenceevent.com 08.30 REGISTRATION & COFFEE 13.40 Risks of Social Media to Organizations and Personnel 09.00 • Insight into potentially disruptive effect of social media on Chairman's Opening Remarks defence and security Mr Geoff Harris, Management Council, Information • Insight into personnel implications from work-related to Security Systems Associations UK personal issues OPENING ADDRESS • Insight into organizational implications including cyber-vetting, 09.10 trust and potential effects on organizational management NATO’s policy on cyber defence and the evolution of the cyber • Using example from real-world and potential scenarios challenge John Ross, Strategic Analyst, Canadian Department of • How cyber is changing the nature of conflict and crisis National Defence management • NATO's perception of the cyber threat • How NATO is constructing its cyber defence organization 14.20 • Future tasks and challenges Sharing sensitive information securely- times are changing Dr Shea, Deputy Assistant Secretary General, Emerging • What business and cyber information is being shared securely Security Challenges Division, NATO and the strategic drivers for it? • What are the collaborative mechanisms, technologies and 09.50 standards enabling such sharing, and the threats to success? Technical aspects of cyber security as seen by the Austrian military and the local milCERT • Where is such information sharing happening in UK and • What is as an "advanced threat"? internationally? • (Scary) ways around conventional defence mechanisms • What's likely to happen in the next 3 years and what should • Live-Demo of a target-system infection with conventional my organisation be doing? defence Mr Patrick Curry OBE, Director, British Business Federation • Emerging cyber threats - strategies to cope with them • Optional: Further live-demos (Fighting back the malware from Authority 1st demo, create custom anti-virus signatures) Mr Ulrich Poeschl, Chief Security Architect, Infosec 15.00 AFTERNOON TEA Planning & Implementation Authority, Austrian MoD 15.30 10.30 MORNING COFFEE Cyber Security and the UK's Critical National Infrastructure 11.00 • Identifying what elements are ‘critical’ Adversity, risk and trustworthiness • Benefits and risks of international commercial cooperation • Why there is a need for a consensus on adversity, risk and • Creating and maintaining a stable cyber policy for protecting trustworthiness CNI • The role of Standards Development Organisations (SDO) in Mr Dave Clemente, Research Associate, International achieving such a consensus Security, Royal Institute of International Affairs • Achieving the desired outcome with the Trustworthy Software Framework (TSF) Mr Ian Bryant, Technical Director, Trustworthy Software 16.10 Initiative Defending the UK defence industry against cyber attack • The changing landscape of the cyber threat to the UK 11.40 Defence Industry Speed up the velocity of investigation with behaviour analysis of • Understanding your cyber resilience maturity in the face of the malware cyber threat? • Identify and capture the signature of suspicious files, • Behavioural Analysis with correlation of other artefact, • How the UK Defence industry is working together to detect, • Importance of Multiple Analysis Platform, analyse and respond to threats • How to correlate multiple malware and find the similar ones? • What does the cyber future bring for the UK Defence Industry? • Result: Malware activity graphs. Mr Vincent Blake, Head of Cyber Security, Hasan Yasar, Technical Manager, CERT, Digital Raytheon UK Intelligence and Investigations, Software Engineering Institute 16.50 12.20 NETWORKING LUNCH Chairman's Closing Remarks and Close of Day One Register online at www.cyberdefenceevent.com • Fax: +44 (0) 870 90 Supported by
  • 3. DAY TWO I 20 JUNE 2013 www.cyberdefenceevent.com 08.30 REGISTRATION & COFFEE 13.40 Achieving global cyber security through cooperation 09.00 • About ENISA • Protecting Critical Information Infrastructure Chairman's Opening Remarks • Input to EU & MS Cyber Security Strategies Mr Geoff Harris, Management Council, Information • Assisting Operational Communities Security Systems Associations UK • Security & Data Breach Notification • Data Protection OPENING ADDRESS • Future Direction 09.10 Dr Steven Purser, Head of Core Operations Department, European Network and Information Security Agency The FBI's role in the advancement of cyber security (ENISA) Special Agent representative, FBI Cyber ALAT, Cyber Division, Federal Bureau of Investigation 14.20 Voluntary participation in national cyber defence: The example 09.50 of the Estonian cyber defence unit Strategies for cyber security and defence: Organisational • Legal and policy framework for using volunteers in national cyber defence perspective • Functioning and roles of the CDU: Estonian case study • Presentation will offer a blueprint what constitutes a successful • Legal implications arising from using volunteers in national cyber strategy cyber defence • Comparison of national cyber strategies Senior Scientist, Legal & Policy Branch, • Basic elements of a cyber defence policy of a multinational NATO CCD COE organisation • Major elements for a successful national cyber security and defence strategy 15.00 AFTERNOON TEA Ms Heli Tiirma Klaar, Cyber Security Policy Advisor, 15.30 Conflict Prevention and Security Policy Directorate, Cyber security incident response European External Action Service • The security services industry’s response to cyber security threats; how do you prepare for an incident and what are the 10.30 MORNING COFFEE immediate steps and decision making process that you will have to go through following an incident • Government and private sector initiatives for validating third 11.00 party security services providers Cyber Defence Capability Building in EU • How to identifying suitable cyber security incident response • Military aspects of the cyber security strategy for the European service suppliers and what should be considered in contracts Union for their services • Military capability development in EU cyber defence Mr Ian Glover, President, • Pooling & Sharing in Cyber Defence CREST • A stock-take of EU cyber defence capability Commander Wolfgang Roehrig, Project Officer Cyber 16.10 Building and managing a comprehensive computer Incident Defence, European Defence Agency response capability • Don't start when the horse has bolted; Starting with protection 11.40 and defence Japanese cyber security update • Scope and ambition • Cyber threats/attacks in Japan • Appetite for Interoperability • Response activities - Are you prepared to share with other nations? • Findings from massive cyber attacks • What tools are out there? • The need for integration and cooperation • Activities on digital Forensics Mr Jeremy O’Connor, Security & Smart Solutions, Mr Akira Yamada, Senior Security Analyst, Selex ES Cyber Defence Institute Japan 16.50 12.20 NETWORKING LUNCH Chairman's Closing Remarks and Close of Day Two 090 712 • Call: +44 (0) 870 9090 711 • GROUP DISCOUNTS AVAILABLE SPONSORSHIP AND EXHIBITION OPPORTUNITIES Are you interested in promoting your defence services to a SMi offer sponsorship, exhibition, advertising and branding packages, targeted industry sector? SMi offer tailored marketing uniquely tailored to complement your company's marketing strategy. Prime packages so that your association / publication can gain networking opportunities exist to entertain, enhance and expand your client access to a global market and key decision makers in the base within the context of an independent discussion specific to your defence market. industry. Should you wish to join the increasing number of companies benefiting from sponsoring our conferences please call: Simon Wright, SMi Contact Sonal Patel, SMi Marketing on +44 (0) 20 7827 6106 Sponsorship +44 (0) 20 7827 6732 or email: swright@smi-online.co.uk or email: spatel@smi-online.co.uk
  • 4. HALF-DAY PRE-CONFERENCE WORKSHOP A 9.00 – 12.30 I 18 JUNE 2013 COPTHORNE TARA HOTEL I LONDON, UK Threat Intelligence, Threat Horizons In association with Overview This workshop will give delegates a valuable insight in to the actions and motivations of potential attackers and understand the number, diversity and speed of actual attacks on their systems and the motivation, techniques, strategies and operations of the attackers as well as the implications of changing IT trends such as BYOD, cloud computing and mobile technology. For too long we have been playing ‘catch up’ with the cyber criminals – it’s time to get ahead of the game and give ourselves an intelligent advantage. Agenda 08.30 Registration & Coffee 09.00 Global cyber threat outlook (recent discoveries/attacks and operations with their likely background and impact/international implications) 09.45 Morning Coffee 10.30 Sector specific cyber threat outlook (financial sector/CNI/aviation/pharma etc) 11.15 Collateral damage from malware used on an international base (examples for Flame, Duqu, Stuxnet and how they are being exploited by cyber criminals) 12.00 End of Workshop About the Workshop Leader Mr Cristiano Lincoln Mattos, SEO, Tempest Security Intelligence CEO Cristiano Lincoln Mattos has been active in Information Security since being introduced to the internet in 1993, and has accumulated significant experience in both engineering and testing security defences. As one of Tempest’s founders, Lincoln has fulfilled a critical role in creating and developing the company’s expertise, products and strategy over the past 12 years. An experienced consultant, he has assumed a variety of roles within Tempest, including penetration testing and vulnerability research projects, developing software tools, and building and leading top-notch teams through complex technical projects. About Tempest Security Intelligence Tempest Security Intelligence has been delivering exceptional service quality to Clients in Brazil and Europe for the past 12 years. Tempest delivers highly specialised information security consulting services to large and medium-sized organisations in the private and public sectors, and is relied on to protect some of the largest global financial institutions. Our focus on information security management allows us to build long-term, strategic relationships with our clients that result in stable and continuous service. Our in-depth knowledge, expertise and extensive R&D efforts, have given Tempest an authoritative position in the cyber security market.
  • 5. HALF-DAY PRE-CONFERENCE WORKSHOP B 13.30-17.00 I 18 JUNE 2013 COPTHORNE TARA HOTEL I LONDON, UK Process Modelling for Information Security Engineering (PROMISE) in the UKCNI In association with Overview The UK Critical National Infrastructure (UKCNI) is crucial to the safetl and defence of the UK, however, they are not always Government owned, are often in the hands of foreign owners and are not subject to a consistent or supervised level of information security. This workshop will address this issue by presenting a model for the design of a socio-technical information security engineering management design methodology for the purpose of reconciling technical requirements with human and social factors inherent in any management system. The method, called PROMISE (Process Modelling for Information Systems Engineering), is intended to provide a model for a researched platform of ideas, expressed as processes, in order to better inform information security decisions with the aim of making those decisions better suited to the needs of the information security manager operating in a UKCNI organisation. Agenda 13.30 Registration & Coffee 14.00 Security management in the UKCNI- It’s not just technology 15.00 Afternoon Tea 15.30 How can Information security management processes in the UKCNI be better designed, developed and implemented? 16.30 Question & Answer Discussion 17.00 End of Workshop About the Workshop Leader Dr Howard Thompson, Managing Director, NAS Defence After a career in policing, security and counter-intelligence work in government service, a number of years of which were spent in IT and Communications Security, Dr Howard Thompson moved into the private sector where he built on his technical expertise by gaining commercial and industrial sector skills and knowledge. Since then, he has undertaken a number of IT security consultancy and management roles in various international industries including aerospace, defence and systems, and now practices as an IT Security Consultant, providing services to many companies and organisations that now comprise the UKCNI. About NAS CyberDefence NAS CyberDefence consultancy services are designed to help organizations to realize the secure and safe management of corporate governance, manage operational risk, maintain legal, regulatory and standards compliance, protect intellectual property and secure business communications.
  • 6. ONLINE at www.cyberdefenceevent.com CYBER SECURITY FOR THE MILITARY AND DEFENCE SECTOR CONFERENCE: 19 - 20 JUNE 2013 COPTHORNE TARA HOTEL, LONDON, UK | WORKSHOPS: 18 JUNE 2013 4 WAYS TO REGISTER FAX your booking form to +44 (0) 870 9090 712 POST your booking form to: Events Team, SMi Group Ltd, 2nd Floor South, PHONE on +44 (0) 870 9090 711 Harling House, 47-51 Great Suffolk Street, London, SE1 0BS EARLY BIRD □ Book by 28 February and receive a £300 discount DISCOUNT □ Book by 28 March and receive a £100 discount CONFERENCE PRICES GROUP DISCOUNTS AVALABLE I would like to attend: (Please tick as appropriate) Fee Total MILITARY, GOVERNMENT & PUBLIC SECTOR RATE □ Conference and both Workshops £2097.00 + VAT £2516.40 □ Conference & Interactive Workshop £1498.00 + VAT £1797.60 Unique Reference Number □ Conference only £899.00 +VAT £1078.80 Our Reference LV D-031 □ Interactive Workshop only £599.00 +VAT £718.80 COMMERCIAL ORGANISATIONS DELEGATE DETAILS □ Conference and both Workshops £2697.00 + VAT £3236.40 Please complete fully and clearly in capital letters. Please photocopy for additional delegates. □ Conference & Interactive Workshop £2098.00 +VAT £2517.60 Title: Forename: □ Conference only £1499.00 +VAT £1798.80 Surname: □ Interactive Workshop only £599.00 +VAT £718.80 Job Title: PROMOTIONAL LITERATURE DISTRIBUTION Department/Division: □ Distribution of your company’s promotional literature to all conference attendees £999.00 + VAT £1198.80 Company/Organisation: The Conference fee includes refreshments, lunch, conference papers and Company VAT Number: CD ROM containing all of the presentations. Email: Address: VENUE Copthorne Tara Hotel, Scarsdale Place, Kensington, London, W8 5SR. □ Please contact me to book my hotel Town/City: Alternatively call us on +44 (0) 870 9090 711, Post/Zip Code: Country: email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712 Direct Tel: Direct Fax: Mobile: DOCUMENTATION (Shipped 10-14 days after the event) Switchboard: I cannot attend but would like to purchase access to the following Document Portal/paper copy documentation: Price Total Signature: Date: □ Access to the conference documentation I agree to be bound by SMi's Terms and Conditions of Booking. on the Document Portal £499.00 + VAT £598.80 ACCOUNTS DEPT □ The Conference Presentations - paper copy £499.00 - £499.00 (or only £300 if ordered with the Document Portal) Title: Forename: Surname: PAYMENT Email: Payment must be made to SMi Group Ltd, and received before the event, by one of Address (if different from above): the following methods quoting reference D-031 and the delegate’s name. Bookings made within 7 days of the event require payment on booking, methods of payment are below. Please indicate method of payment: Town/City: □ UK BACS Sort Code 300009, Account 00936418 Post/Zip Code: Country: □ Wire Transfer Lloyds TSB Bank Plc, 39 Threadneedle Street, London, EC2R 8AU Swift (BIC): LOYDGB21013, Account 00936418 Direct Tel: Direct Fax: IBAN GB48 LOYD 3000 0900 9364 18 □ Cheque We can only accept Sterling cheques drawn on a UK bank. Terms and Conditions of Booking □ Credit Card □ Visa □ MasterCard □ American Express All credit card payments will be subject to standard credit card charges. Payment: If payment is not made at the time of booking, then an invoice will be issued and must be paid immediately and prior to the start of the event. If payment has not been received then Card No: □□□□ □□□□ □□□□ □□□□ credit card details will be requested and payment taken before entry to the event. Bookings within Valid From □□/□□ Expiry Date □□/□□ 7 days of event require payment on booking. Access to the Document Portal will not be given until payment has been received. Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, another delegate to take your place at any time prior to the start of the event. Two or more delegates may CVV Number □□□□ 3 digit security on reverse of card, 4 digits for AMEX card not ‘share’ a place at an event. Please make separate bookings for each delegate. Cancellation: If you wish to cancel your attendance at an event and you are unable to send a Cardholder’s Name: substitute, then we will refund/credit 50% of the due fee less a £50 administration charge, providing that cancellation is made in writing and received at least 28 days prior to the start of the event. Regretfully cancellation after this time cannot be accepted. We will however provide the Signature: Date: conferences documentation via the Document Portal to any delegate who has paid but is unable I agree to be bound by SMi's Terms and Conditions of Booking. to attend for any reason. Due to the interactive nature of the Briefings we are not normally able to provide documentation in these circumstances. We cannot accept cancellations of orders Card Billing Address (If different from above): placed for Documentation or the Document Portal as these are reproduced specifically to order. If we have to cancel the event for any reason, then we will make a full refund immediately, but disclaim any further liability. Alterations: It may become necessary for us to make alterations to the content, speakers, timing, VAT venue or date of the event compared to the advertised programme. Data Protection: The SMi Group gathers personal data in accordance with the UK Data Protection Act 1998 and we may use this to contact you by telephone, fax, post or email to tell you about other products and services. Unless you tick here □ we may also share your data with third parties offering complementary products or services. If you have any queries or want to update any of VAT at 20% is charged on the attendance fees for all delegates. VAT is also charged on the data that we hold then please contact our Database Manager databasemanager@smi- online.co.uk or visit our website www.smi-online.co.uk/updates quoting the URN as detailed above Document Portal and Literature Distribution for all UK customers and for those EU customers not your address on the attached letter. supplying a registration number for their own country here: _______________________ If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk